Nikita Borisov
Nikita Borisov
Professor of Electrical and Computer Engineering, University of Illinois at Urbana
Verified email at illinois.edu - Homepage
Title
Cited by
Cited by
Year
Intercepting mobile communications: The insecurity of 802.11
N Borisov, I Goldberg, D Wagner
Proceedings of the 7th annual international conference on Mobile computing …, 2001
14712001
EASiER: Encryption-based access control in social networks with efficient revocation
S Jahid, P Mittal, N Borisov
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
5172011
The Ninja architecture for robust Internet-scale systems and services
SD Gribble, M Welsh, R Von Behren, EA Brewer, D Culler, N Borisov, ...
Computer Networks 35 (4), 473-497, 2001
4882001
The tangled web of password reuse.
A Das, J Bonneau, M Caesar, N Borisov, XF Wang
NDSS 14 (2014), 23-26, 2014
3852014
Off-the-record communication, or, why not to use PGP
N Borisov, I Goldberg, E Brewer
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 77-84, 2004
3752004
Flybynight: mitigating the privacy risks of social networking
MM Lucas, N Borisov
Proceedings of the 7th ACM workshop on Privacy in the electronic society, 1-8, 2008
3122008
BotGrep: Finding P2P bots with structured graph analysis
S Nagaraja, P Mittal, CY Hong, M Caesar, N Borisov
Proceedings of the 19th USENIX conference on Security, 7-7, 2010
2802010
Denial of service or denial of security?
N Borisov, G Danezis, P Mittal, P Tabriz
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2112007
Computational puzzles as sybil defenses
N Borisov
Peer-to-Peer Computing, 2006. P2P 2006. Sixth IEEE International Conference …, 2006
2062006
A tune-up for Tor: Improving security and performance in the Tor network
R Snader, N Borisov
Proceedings of the Network and Distributed Security Symposium-NDSS 8, 2008
1822008
A generic application-level protocol analyzer and its language
N Borisov, DJ Brumley, HJ Wang, J Dunagan, P Joshi, C Guo
14h Symposium on Network and Distributed System Security (NDSS), 2007
1512007
Rainbow: A robust and invisible non-blind watermark for network flows
A Houmansadr, N Kiyavash, N Borisov
Proceedings of the Network and Distributed System Security Symposium (NDSS …, 2009
1472009
DECENT: A decentralized architecture for enforcing privacy in online social networks
S Jahid, S Nilizadeh, P Mittal, N Borisov, A Kapadia
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
1452012
Cirripede: circumvention infrastructure using router redirection with plausible deniability
A Houmansadr, GTK Nguyen, M Caesar, N Borisov
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1432011
Cachet: a decentralized architecture for privacy preserving social networking with caching
S Nilizadeh, S Jahid, P Mittal, N Borisov, A Kapadia
Proceedings of the 8th international conference on Emerging networking …, 2012
1332012
Do you hear what i hear? fingerprinting smart devices through embedded acoustic components
A Das, N Borisov, M Caesar
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1172014
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones
S Zonouz, A Houmansadr, R Berthier, N Borisov, W Sanders
Computers & Security 37, 215-227, 2013
1122013
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting
P Mittal, A Khurshid, J Juen, M Caesar, N Borisov
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1112011
SWIRL: A scalable watermark to detect correlated network flows
A Houmansadr, N Borisov
Proc. NDSS, 2011
1072011
Security of the WEP algorithum
N Borisov
http://www. isaac. cs. berkeley. edu/isaac/wep-faq. html, 2001
1072001
The system can't perform the operation now. Try again later.
Articles 1–20